Shocking acceleration in the use of Cyberweapons between Iran and the U.S against each other has been revealed in a newly released...
Your MAC can be purloined and your user account and password can be bypassed by nefarious individuals for accessing personal data, wiping...
The official website of world’s largest PC maker was hacked earlier Wednesday allegedly by Lizard Squad. Hackers left a deface page containing slideshow...
Isis supporter compromised Chile’s Ministry of Defense website on Monday night and left a message “Hacked” on its homepage, www.ssdefensa.cl, along with...
The FBI has offered a record $3 million reward for information leading to the arrest of a cybercriminal, reports the BBC.
Hey guys, I write how-to content at fossBytes on regular basis. The contents that I write are pretty simple and based on...
Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all...
Short Bytes: Part of the computer science fraternity? Ever wished to rake in the big bucks? Chances are that you might have realised...
Even if you're not a customer of health insurer Anthem, your data could have been put at risk. Be on your guard.
MS Word’s Malicious Macro Facilitates Downloading of Vawtrak Trojan – This time attackers rely upon VBS file containing Execution Policy Bypass Flag....
Lately, an email from Amazon has been hitting the inbox of unsuspecting users all over the world. This email has been masqueraded...
The world renowned Lenovo Computer manufacturing company has been shipping laptops prepackaged with malware that makes you more vulnerable to hackers —...
A 51 year old man is facing a lengthy prison sentence in the United Kingdom after admitting to a series of distributed...
The online queuing system for the 40,000 tickets to the Burning Man festival was hacked by 200 people accessing a 'technical backdoor'...
This post is for so many of the people in the community asking for and having problems installing Kali Linux. Here is...
Remember Lizard Squad? Yes, the same Lizard Squad who shutdown PSN and Xbox Live last Christmas making the holidays one living hell for games....
A Saudi based “oppressed defenders” hacking group has taken down the online banking domain of Arab National Bank, early Monday. The cyber attack on ANB...
New Android malware transforms your Phone into a Spy while it is Off – New Android Malware threat has been discovered by...
With the recent reports making media headlines about how the NSA and GCHQ have compromised millions of SIM keys manufactured by Gemalto,...
Kris Jenner is reportedly being blackmailed over a naked video that was stolen from her iCloud and could be released in the...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams